Search for packages
purl | pkg:pypi/lxml@4.6.3 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-gufu-nks1-aaag
Aliases: CVE-2022-2309 GHSA-wrxv-2j5q-m38w PYSEC-2022-230 |
NULL Pointer Dereference in lxml |
Affected by 0 other vulnerabilities. |
VCID-ub64-azys-aaaf
Aliases: CVE-2021-43818 GHSA-55x5-fj6c-h6m8 PYSEC-2021-852 |
lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch. There are no known workarounds available. |
Affected by 1 other vulnerability. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-jq1x-31sj-aaas | An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in lxml 4.6.3. |
CVE-2021-28957
GHSA-jq4v-f5q6-mjqq PYSEC-2021-19 |